Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons...
This book presents a unique blend of articles which combines both conceptual and practical concer...
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web inte...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide varie...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
Terrorist groups throughout the world have been studied primarily through the use of social scien...
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy
Search games and rendezvous problems have received growing attention in computer science within t...
This Springer Brief presents a basic algorithm that provides a correct solution to finding an opt...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over f...
This edited volume features a wide spectrum of the latest computer science research relating to c...